Mobile phone-based identity identification and near-field payment method

A technology for identification and near-field payment, which is applied in the fields of mobile payment, wireless communication, mobile identification, and access control authentication. It can solve the problems of easy loss of identity identification carrier, complicated operation, and inconvenient portability, so as to facilitate work, life, and operation. Convenience and high safety effect

Inactive Publication Date: 2013-02-13
NANNING BAIRUI TECH DEV CO LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme of identification and near-field payment has the following disadvantages: (1) It requires special identification equipment and identification carrier, which is complicated to operate, inconvenient to carry, and the identification carrier is easy to lose; (2) The realizatio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Example 1: Near Field Payment

[0046] On the basis of the bank's existing security strategy, cooperate with the corresponding business process to bind the mobile phone card or mobile phone number with the bank card or bank account one-to-one, one-to-many, and many-to-one. Through the identifiability and uniqueness of the mobile phone card or mobile phone number of the operator's communication network, the mobile phone user is authenticated, and in the process of real-time communication, the identity certification of the mobile near-field payment or mobile phone transfer process is ensured.

[0047] The specific operation steps are as follows:

[0048] (1) A payment transaction server is added to the banking system, which is connected to the identity authentication server and the banking system respectively. The payment transaction server is responsible for managing the transaction behavior and transaction authority of the receiver and the payer, and submitting the pay...

Embodiment 2

[0051] Embodiment 2: access control identification

[0052] On the basis of the original access control system, mobile phone access control is added. Through the identifiability and uniqueness of the mobile phone card or mobile phone number of the communication operator, the mobile phone user is authenticated. According to the authentication result, the mobile phone connected to the access control host Send a message to the access control host to realize the opening and closing of the system.

[0053] The specific operation steps are as follows:

[0054] 1. Cooperate with the property and security department to add an access control mobile phone to the control host of the access control system, and connect with the application server and the access control host respectively (via USB interface), and open the bluetooth connection; and the application server behind the Internet gateway to establish an intermediate database for the one-to-one binding relationship between the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile phone-based identity identification and near-field payment method. The method comprises the following steps of: guaranteeing the identifiability and the unique legality of the mobile phone by checking a mobile station integrated services digital network (MSISDN) information in a communication protocol; establishing a medium database by an application developer, binding a mobile phone card or a mobile phone number to application data, translating sensitive information into a security non-confidential format, and establishing a corresponding relation between the identity of the application data and a mobile phone user; installing corresponding software in the mobile phone, sending an identity authentication request, and carrying out on-line identity authentication by searching binding information of the medium database; and performing the near-field payment and the identity identification based on the identity authentication. By the method, under the condition that hardware of the mobile phone is not changed, the mobile phone card is not replaced, and any identity identification equipment is added to the mobile phone, the mobile phone is bound to a bank card or a gate card is bound to a user identity and a user authority; the method is high in security and convenient to operate; and work and life of people are greatly facilitated.

Description

technical field [0001] The invention relates to the technical fields of wireless communication, mobile phone identification, mobile payment, access control authentication, etc., in particular to a method for completing identification and near-field payment through a mobile phone. Background technique [0002] Existing identity authentication methods generally use additional identification carriers, such as radio frequency identification, IC cards, special information cards, U-shields, U-Keys or USB-keys and other contact or non-contact identification devices, as well as corresponding Identification equipment, such as reading and writing equipment, to realize the identification and near-field payment of cardholders. This scheme of identification and near-field payment has the following disadvantages: (1) It requires special identification equipment and identification carrier, which is complicated to operate, inconvenient to carry, and the identification carrier is easy to los...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06G06Q20/32G07C9/00
Inventor 苏福玉梁春民
Owner NANNING BAIRUI TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products